Top Banner
OpenPGP
59

OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Apr 07, 2016

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

OpenPGP

Page 2: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography.

It is based on PGP as originally developed by Phil Zimmermann.

Page 3: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

The OpenPGP protocol defines standard formats for encrypted messages, signatures, and certificates for exchanging public keys.

Page 4: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Beginning in 1997, the OpenPGP Working Group was formed in the Internet Engineering Task Force (IETF) to define this standard that had formerly been a proprietary product since 1991.

Page 5: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Over the past decade, PGP, and later OpenPGP, has become the standard for nearly all of the world's encrypted email.

Page 6: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

By becoming an IETF Proposed Standard (RFC 2440), OpenPGP may be implemented by any company without paying any licensing fees to anyone.

Page 7: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

The OpenPGP Alliance brings companies together to pursue a common goal of promoting the same standard for email encryption and to apply the PKI that has emerged from the OpenPGP community to other non-email applications.

Page 8: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Technical Information

The OpenPGP Proposed Standard is defined by the OpenPGP Working Group of the Internet Engineering Task Force (IETF) Proposed Standard RFC 2440.

Page 9: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

This document contains all the necessary information to develop interoperable applications based on the OpenPGP format.

Page 10: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

It describes the format and methods needed to read, check, generate, and write conforming encrypted messages, keys, and signatures.

Page 12: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

HushMail

If you want a highly mobile way to do PGP-style encrypted email, you might consider HushMail, from Hush Communications.

HushMail is a web-based encrypted email service that uses a downloaded Java applet to encrypt and decrypt email in your browser.

Page 13: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

There's nothing to install, because it's all done in your browser.

Which greatly simplifies deployment in large corporate environments.

It's also handy for road warriors who might need to check their encrypted email from an Internet cafe.

Page 15: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

PGP Command-line Products

If you need a command-line version of PGP, you can get it from PGP Corp.

You can also get other OpenPGP-compliant command-line products from other people, such as Gnu Privacy Guard (also known as GnuPG or GPG) and FileCrypt.

Page 16: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

PGP Command-line Products

All of these OpenPGP-compliant command-line products run on a variety of Unix platforms, as well as the Windows command-line shell.

Page 17: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Como funciona PGP

O PGP combina algumas das melhores características da criptografia simétrica e criptografia de chave pública.

O PGP é um cripto-sistema híbrido.

Page 18: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Compressão em PGP

Quando um usuário encripta texto puro com o PGP, o PGP comprime o texto puro em primeiro lugar.

A compressão de dados economiza tempo de transmissão de modem e espaço em disco e, mais importante, aumenta a segurança da criptografia.

Page 19: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Criptoanálise

A maioria das técnicas de criptoanálise explora padrões encontrados em textos puros para quebrar o código (Craxi te ceder).

Page 20: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Compressão e Criptoanálise

A compressão reduz estes padrões no texto original, aumentando significativamente a resistência à criptoanálise.

Page 21: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Compressão

Arquivos muitos pequenos para serem comprimidos ou que não suportam a compressão não são comprimidos.

Page 22: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Chave de Sessão

O PGP cria então uma chave de sessão (session key), uma chave secreta para uso uma única vez.

No PGP, esta chave é um número gerado aleatoriamente pelos movimentos imprecisos do seu mouse e das teclas que você aciona.

Page 23: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Chave de Sessão

A chave de sessão utiliza um algoritmo de encriptação convencional extremamente rápido e seguro, encriptando o texto puro, gerando o texto cifrado.

Page 24: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Criptografando a chave de sessão

Uma vez os dados encriptados, a chave de sessão é encriptada na chave pública do destinatário (recipient).

Page 25: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Chave de Sessão transmitida

Finalmente, esta chave de sessão encriptada numa chave pública é transmitida com o texto cifrado para o destinatário.

Page 26: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Criptografando com PGP

Page 27: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Decriptografando com PGP

A decriptação funciona de modo inverso.

O receptor da mensagem usa a sua chave privada para recuperar a chave de sessão, que o PGP usa para decriptar o texto cifrado.

Page 28: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Decriptografando com PGP

Page 29: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Os dois métodos de criptografia

O uso dos dois métodos de encriptação combina a conveniência da encriptação de chave pública com a agilidade da encriptação convencional.

Page 30: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Os dois métodos de criptografia

A encriptação convencional é aproximadamente 10.000 vezes mais veloz do que a encriptação de chave pública.

Page 31: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Os dois métodos de criptografia

A encriptação de chave pública por sua vez fornece uma solução para a distribuição de chaves e transmissão de dados.

Page 32: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Os dois métodos de criptografia

Usadas em conjunto, a performance e a distribuição das chaves são otimizadas sem comprometer a segurança.

Page 33: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

O formato PGP de certidão

A certidão PGP inclui (mas não se limita) as seguintes informações:

Page 34: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

A chave pública da certidão do portador

A porção pública do seu par de chaves, junto com o algoritmo da chave: RSA, RSA Legacy, DH (Diffie-Hellman), ou DSA (Digital Signature Algorithm).

Page 35: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Informação do portador da certidão.

Consiste em informações da identidade do usuário, como nome, user ID, e-mail, número ICQ, retrato fotográfico, e assim por diante.

Page 36: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Assinatura digital do portador da certidão.

Chamada também de auto-assinatura, é a assinatura feita usando a chave privada correspondente à chave pública associada à certidão.

Page 37: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Prazo de validade da certidão – Data de início e término da validade da certidão; indica quando expira a certidão.

Caso o par de chaves contenha sub-chaves, então serão incluídos os prazos de validade das sub-chaves.

Page 38: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Algoritmo de encriptação simétrica preferido pelo usuário – os algoritmos suportados são: CAST, AES, IDEA, Triple-DES, e Twofish.

Page 39: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Analogia

Você pode pensar na certidão PGP como uma chave pública com uma ou mais etiquetas coladas.

Page 40: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Analogia

Nestas ´etiquetas´ você encontrará informações identificando o dono da chave e a assinatura do mesmo, determinando que chave e identificação andam juntas.

Page 41: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Esta assinatura em especial é chamada de auto-assinatura.

Toda certidão PGP contém uma auto-assinatura.

Page 42: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Um aspecto único do formato de certidão PGP é o fato de uma certidão poder conter várias assinaturas.

Page 43: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Algumas ou muitas pessoas podem assinar o par de chaves/identificação para atestar para sua própria garantia que a chave pública pertence definitivamente ao dono especifico.

Page 44: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Se você for olhar num servidor público de certidões, irá notar que algumas certidões, como a do criador do PGP, Phil Zimmermann, contém várias assinaturas.

Page 45: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Algumas certidões PGP consistem em uma chave pública com várias etiquetas, cada uma contendo meios diferentes de identificar o dono da chave

Page 46: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Tudo em um certificado

Por exemplo, o nome do dono e e-mail corporativo, o apelido do dono e e-mail pessoal, uma fotografia do dono – tudo embutido em um certificado.

Page 47: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

A lista de assinaturas de cada uma destas identidades pode ser diferente.

As assinaturas atestam que uma das etiquetas pertence à chave pública, e não que todas as etiquetas contidas na chave são autênticas.

Page 48: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Observe que o significado de ´autêntico´ está no olho do dono – assinaturas são opiniões.

E cada pessoa avalia a autenticidade de uma identidade de modo diverso antes de assinar uma chave (nome dado a uma certidão PGP).

Page 49: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Formatos de certidões em PGP

O PGP reconhece dois formatos de certidões diferentes:

Certidões PGP (chamadas simplesmente de chaves PGP)

Certidões X.509

Page 50: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Certificado PGP

Page 51: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Certificado X.509

Page 52: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

O que é uma frase-senha ?

A maioria das pessoas está familiarizada com o uso de senhas para restringir o acesso aos seus computadores.

Uma frase-senha é uma versão

estendida de uma senha, e na teoria, é mais segura.

Page 53: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Ataque de dicionário

Geralmente composta de várias palavras, uma frase-senha é mais segura contra ´ataques de dicionários´, onde o agressor aplica todos as palavras contidas em um dicionário na esperança de encontrar a sua senha.

Page 54: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Frases-senhas

As melhores frases-senhas são relativamente longas e complexas e contém uma combinação de letras maiúsculas e minúsculas, caracteres numéricos e de pontuação.

Page 55: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

O PGP usa uma frase-senha para encriptar a sua chave privada na sua máquina.

A sua chave privada é encriptada no seu disco usando um ´hash´ da sua frase-senha como chave secreta.

Page 56: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Você usa a frase-senha para decriptar a sua chave privada.

Uma frase-senha deve ser difícil de você esquecer e difícil para outros adivinharem

Page 57: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Deveria ser alguma coisa bem fixada na sua memória de longo prazo e não algo que você inventou do nada.

Por que?

Page 58: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

Porquê se você esquecer a sua frase-senha, você estará em maus lençóis.

A sua chave privada será completamente inútil sem a sua frase-senha e nada poderá ser feito.

Lembra-se da frase no começo deste capítulo?

Page 59: OpenPGP. OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil.

O PGP é a criptografia que manterá grandes organizações governamentais fora dos seus arquivos.

Com certeza manterá você fora dos seus arquivos também!

Mantenha isto em mente quando decidir mudar a sua frase-senha.